Sciweavers

801 search results - page 123 / 161
» Robust Nonproprietary Software
Sort
View
ACRI
2006
Springer
15 years 4 months ago
Optimal 6-State Algorithms for the Behavior of Several Moving Creatures
The goal of our investigation is to find automatically the absolutely best rule for a moving creature in a cellular field. The task of the creature is to visit all empty cells wi...
Mathias Halbach, Rolf Hoffmann, Lars Both
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
15 years 4 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst
IMC
2006
ACM
15 years 4 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
MM
2006
ACM
129views Multimedia» more  MM 2006»
15 years 4 months ago
GVU-PROCAMS: enabling novel projected interfaces
Front projection allows large displays to be deployed relatively easily. However, it is sometimes difficult to find a location to place a projector, especially for ad-hoc instal...
Jay Summet, Matthew Flagg, James M. Rehg, Gregory ...
ACSAC
2005
IEEE
15 years 3 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...